[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 11 Nov 2011 23:09:37 +0100
From: rootkit rootkit <rootkit77@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: NTLM challenge/response cracking (again...)
On Fri, Nov 11, 2011 at 4:58 PM, Solar Designer <solar@...nwall.com> wrote:
> It is supposed to work for other challenges as well, but then you won't
> get "matching salts", so cracking of multiple C/R pairs will be slower.
Understood, thanks.
> Can you please post this sample C/R pair and the corresponding password
> (change it again before posting, indeed)?
Sure, here it is. I didn't change the password as it's just a testing
one. I won't include the username though, hope it's not important
password: welcome103
username:::19448aa9bd58a2adb6e690256fae100d47456f959bb61fa1:e6b41f380a23789abedd5a701c1c32bd0101000000000000:d3c4518b1ae3f15a
ver: 1.7.8-jumbo-7 [win32-cygwin-x86-sse2]
> Also, it might help if you
> include some info on the systems involved (such as versions of Windows).
On the client side, Windows Vista EE 32 bits.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ